Professional Documents
Culture Documents
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
The core of a CAPTCHA service is its scheme which defines the challenge as well as the required and supported human interactions. Only when it is done
right, it will protect the services while retaining users. TAPCHA is a new CAPTCHA scheme designed with 'mobile first' initiative and the utilisation of
cognitive biases to address the following challenges for online businesses and service providers:
1. They need an effective CAPTCHA scheme to stop their services from automated abuses affecting their intended uses, leading to cyber attacks and
brand/reputation damage.
2. They need a mobile-first CAPTCHA that fits nicely into their 'mobile-first' designed services (e.g., mobile apps, responsive web apps etc.).
3. They need a less-intrusive or immersive CAPTCHA scheme that users can easily complete to maximise online transactions.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Researchers at the University of Gloucestershire and Imperial College London have overcome these deficiencies by creating an encrypted communication
protocol between the implanted device and the external gateway that controls it. With millions ofpeople relying on medical implants for their health and
wellbeing, Innovate UK funding has helped researchers to complete the final stages of bringing a solution to market. A solution which will protect people from
the threat of a cyber-security attack that could have life threatening consequences.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
These nuances, while complex for non-expert users to learn, lend themselves to being automated by machine learning models. We are working on an
augmented reality based security assistant: a mobile device system that uses computer vision and machine learning techniques together with immersive AR
capabilities of modern smartphones and headsets to supervise and provide seamless security guidance to non-expert users by _looking_ at the screens of
other devices and instructing them on how to use them.
More specifically, after an email is received, our solution allows the user to scan it with their mobile phone and receive an estimate of the likelihood of the
email being a fraudulent phishing attempt, together with interactive explanations as to why such a conclusion was made.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
This project seeks to create a tool that can be used to facilitate Privacy in a Smart Circular Economy (PITCH). PITCH is a comprehensive privacy risk
assessment tool that will facilitate informed decision making of the suitability of data collected from organisations and prosumers for reuse as part of a Smart
Circular Economy (SCE).
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
This project is developing a new authentication system that allows web servers and web browsers to convince each other that they aren't just talking
securely, but they're talking securely to the right people! Without requiring complex set-up or operation for the user, the new system can warn you of man-in-
the-middle attacks before any compromising information is sent.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
This project will analyse the feasibility of developing a multi-modal continuous and transparent authentication architecture for mobile devices. The proposed
solution will significantly enhance current state-of-the-art authentication approaches by using multiple biometric modalities (facial recognition, keystroke
analysis, behavioural profiling) to continuously and transparently authenticate end-users. The proposed architecture will provide end-users with a convenient,
non-intrusive, application specific authentication approach which is capable of understanding the different risk levels and requirements of individual
applications.
The proposed architecture utilises existing hardware technologies such as facial recognition, keystroke analysis, application usage and fingerprint recognition
to continuously authenticate end-users based on their psychological and behavioural characteristics. This solution is scalable and provides further
opportunities for additional authentication modalities such as smartwatch physical activity recognition.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
The 2016 Forrester Report "Hunting Insider Threats" identified eight key factors as common motivators of Insider Threat: Financial distress; Employee
disgruntlement; Perceived employee entitlement to sensitive information and IP; Job insecurity; Revenge; Conflict at work; Ideology and Outside influence.
Our goal in this project is to use advanced AI and transactional analytics to (i) identify communication patterns characteristic of both team and company
breakdown (hence identifying potential lack of engagement within teams and employees at risk of losing their job); (ii) identify language use characteristic of
deception (alongside proven metrics of message \`sentiment'), enabling automatic alerts on potential employee distress, disgruntlement, insecurity etc. and
(iii) identifying a-typical communication patterns to foreground signals characteristic of potential outside influence within a company.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Royal Holloway Univ of London BLEMAP: Security for Bluetooth Low £17,994 £17,994
Energy Enabled Applications
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Consequently, there has been policy-based and legal initiatives aimed to mitigate the privacy harm resulting from badly designed software. For instance, the
General Data Protection Regulation (GDPR) and complementing UK Data Protection Act aims primarily to give control to individuals over their personal data.
But while efforts to protect user privacy are being enacted through laws and best practice propositions, it is still the responsibility of software engineers to
ensure that technologies are architected, designed and coded with privacy as an inherent property. Yet, designers lack tools and methods for evaluating their
design with respect to stated privacy objectives. Hence, this project will investigate the commercial potentials of a tool that helps designers of software
examine the privacy-preserving capabilities of their design and consider regulatory compliance. With this tool, designers can distinguish between good and
bad software design, as well as alternative design choices.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Unlike other disciplines within the IT sector, cybersecurity is a combination of aptitude, skill and behavior. Traditional instructional-approach of providing
information about risks and reactive measures is inadequate. 'CyberGaTE aims to address these challenges by using the concept of serious games for
communicating secure behaviour, artificial intelligence to react to user's actions and thereby assessing user's secure behaviour against best practice
principles and cloud environment will give user's, access to real devices.
CyberGaTE will act as an intelligent, personalised training and assessment environment that organisations could use for effective cybersecurity behaviour
training for end users and security professionals; To assess their current security behaviour to anticipate risk they pose and identify their specific training
needs. Schools and Universities could use the environment for inspiring, engaging and identifying potential young talents with aptitude for secure behaviour.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Upon death, there are digital assets one wants to transfer control to others such as family, friends or work colleagues; examples are passwords to access a
laptop, social media, email, cryptocurrencies or digital documents. There are also digital assets a person may want to have destroyed so to be in control of
memory.
AngelPass will be a new product where anyone can securely manage passwords, documents, etc., for a long period; upon a life event, and depending on the
person's wishes, they are either destroyed or sent to someone else. A key feature is that AngelPass will have no access to user passwords or documents at
any time so all the secrets shared with us are completely secure.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
We have a cyber-security system modelling prototype which has reached a maturity level where it is already of interest to adopters in multiple sectors. The
System Security Modeller (SSM) will improve the security of IT systems, reducing personal data breaches and system downtime. The tool analyses a
complete IT system: networks, computers, processes, data, operators, users and physical and legal spaces. Using a novel threat and control identification
technique we can identify threats from hackers, employees, software failure or misconfiguration and highlight non-compliance with data protection
regulations. Our tool lets a user assess which threats have the highest risk (likelihood and impact) and propose appropriate security measures (data
encryption, firewalls, etc.) which should be implemented.
The SSM will automatically identify threats in an IT system, assess the risk level and choose the appropriate security controls (ISO 27005 process)
significantly more robustly, reliably and efficiently than current practice. Security costs will be reduced and cyber-security increased supporting the UK's
dependence on increasingly networked IT systems in business and society.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
1) provide an open source library of the Verifiable Credentials code so that organisations can freely download and use it. This will help to grow the market for
Verifiable Credentials.
2) establish an SME that is able to provide consultancy support, bespoke tailoring, and application development and integration, using the open source code,
for those organisations who do not have the expertise or staff to do it themselves.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
This project aims at superseding the obsolete techniques in use today with an innovative and intelligent child-safety shield. The value proposition is
manifested by quicker intervention and better filtering capabilities with the ability to address emerging threats targeting children on social media. The project
also aims at achieving incident response and safer Internet surfing without having to block popular services and websites.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
SCIPS is a table-top exercise in which participants take on a predefined senior executive role. Teams are required to balance a limited investment budget
against competing market, corporate and personal priorities. Each turn requires a team decision, this involves selecting from a range of potential security
measures that may be implemented and also which budget will fund these measures.
The game has been designed to encourage discussion within the teams, with all actions having potential benefits but a reduction in any budget leads to a
negative financial situation for at least one player.
As the game progresses, the actions taken by players can mitigate the impact of malicious actions upon their company, which in turn impacts upon the share
price of the company. Success in the game is based upon the financial status of the company at the end of the game.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
[0]: https://www.v3.co.uk/v3-uk/news/3028337/most-off-the-shelf-iot-devices-carry-frightening-security-risks-warn-researchers
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Sycamore has been tested in several application domains related to cyber security and safety management -- cross-channel fraud in digital banking,
evacuation policy in public safety and business workflow management. It has been made commercially viable product with the support of DCMS on the basis
of previous research and experimental development by an academic team of the Cyber Security Research Centre of London Metropolitan University.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
a) are well designed and resilient against cyberattacks through rigorous pentesting; and
b) have digital forensics capabilities that can investigate cyberattacks and misbehaviour within the system.
The provision of the listed capabilities through the AISecure suite will undoubtedly mitigate an AI algorithm's social, ethical, legal and technological risks.
The first innovation is the ability to deal with the combination of traditional cyber-threats and specific AI attacks, like the poisoning of the learning
mechanisms in a single AISecure suite, a crucial aspect that is missing in most current commercial pentesting solutions/services. The second innovation is to
provide forensic investigation capabilities related to AI systems that help identify the culprits and influence the security design of future AI systems.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
Participant organisation names Project title Proposed project costs Proposed project grant
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results
c.provide a transparent auditing and compliance assessment service that analyses the activities in an organisation?as a whole and?not as a subset of
individual services such as firewalls or IDS logs/events.
Transparent Compliance will monitor security and privacy services in an organisation, integrating their monitoring logs and building a causality chain. The
chain represents the sequences of inter-related events that might be temporally disjointed and allowed at the individual level but collectively might violate the
security and privacy policies. The causality chain is analysed to verify an organisation's compliance with the required security and privacy preservation
policies, thus providing a holistic, corporate-wide, real-time auditing and compliance assessment service.
Note: you can see all Innovate UK-funded projects here: https://www.gov.uk/government/publications/innovate-uk-funded-projects
Use the Competition Code given above to search for this competition’s results